19
Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

Embed Size (px)

Citation preview

Page 1: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

Security and Trust in Mobile Devices

Abdulrhman AlkhaniferRicardo Figueroa

Page 2: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DEVICES - Introduction

• Mobile devices serve as access points to data stored either locally or in some remote server.

• Currently there are 5.3 billion mobile users around the world (77% of the world population)1 .

• How many of them are smartphones?

1 [International Telecommunication Union (October 2010), mobiThinking, http://mobithinking.com/mobile-marketing-tools/latest-mobile-stats]

Page 3: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DEVICES - Smartphone Market ShareOS 2011 Market Share1

Android 38.5%

Blackberry 13.4%

iOS 19.4%

Symbian 19.2%

Windows Mobile 5.6%

Others 3.9%

Total smartphones 468 million8.83% (468/5300) of mobile users use smartphones (excluding tablets)

1 [Worldwide Mobile Communications Device Open OS Sales to End Users by OS, Gartner, http://www.gartner.com/it/page.jsp?id=1622614]

Page 4: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DEVICES - Why is it important to think about Security and Trust?

• Mobile devices are “single user OS” which is very different from laptop or desktop OS’s security point of view.

• Most mobile users do not realize the potential risk of exposing information, or identity theft.

• Mobile devices serve as access points to personal and/or corporate information and are more accessible than laptop or desktop computers.

Page 5: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DATA - SensitivityData Type Example

Personal Data Account numbers, SSN, photos, calendar info, email, physical location

Business Data Corporate financial information, corporate intellectual property (trade secrets, product launches), business email

Non-sensitive Data Songs, random pictures, etc.

Page 6: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DATA - What is the value if lost?Value Example

Sentimental Value Family photos

Financial Value Bank Account No., SSN

Time Value Contacts and Calendar

Privacy Value Medical Records, University ID

Page 7: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DATA - Where does it reside?Storage Type Example Ownership

Local Storage Device internal memory User

Removable Storage SIM card, SD, Micro SD etc. User

Cloud Service iCloud, Amazon Cloud Drive User and storage provider

Service Provider Gmail servers, Online banking User and storage provider

Page 8: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

DATA - Accessibility Threats Physical Access

Pin number and password

Owner behavior

Eavesdropping

Internet and Wireless Access

Bluetooth

GSM

Blackberry

Privacy

GPS enabled tracking

Custom profiling

Page 9: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Physical Access

• PIN number typically of 4-6 numbers.• A 4-digit pin number requires 10000 tries (using

brute force attack) which is not impossible!• Password.• Auto-lock feature.– iPad 2 issue before iOS 5 and smart cover

• Some users do not use PIN number or password.• Easy to break a 4-digit PIN number by

eavesdropping.

Page 10: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Internet and Wireless Access

• Bluetooth Attacks1:– Bluesnarfing (2003-2004)– Bluebugging– Bluejacking– Denial of service (DoS)

1 [A menu of Bluetooth attacks, Governoment Computer News, http://gcn.com/Articles/2005/07/20/A-menu-of-Bluetooth-attacks.aspx]

Page 11: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS – GSM Security Features

• GSM encryption mechanism is based on a symmetric stream cipher.

• The key for encryption is established as part of the authentication protocol.

• 64-bit A5/1 GSM encryption1.• 128-bit A5/3 GSM encryption [2007].• 4G (LTE): 128-bit AES, or 128-bit SNOW 3G2.

1 [Karsten Nohl, 1988, http://www.engadget.com/2009/12/29/gsm-call-encryption-code-cracked-published-for-the-whole-world/]2 [Security in the LTE-SAE Network, documentation, Agilent Technologies, http://www.home.agilent.com/upload/cmc_upload/All/Security_in_the_LTE-SAE_Network.PDF?&cc=US&lc=eng]

Page 12: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - 3G Encryption

• Is the data transmitted over 3G/4G network secure?– “Israel's Weizmann Institute of Science went

ahead and cracked the KASUMI system -- a 128-bit A5/3 algorithm implemented across 3G networks -- in less than two hours”1,2 .

1 [3G GSM encryption cracked in less than two hours, engadget, Jan 2010, http://www.engadget.com/2010/01/15/3g-gsm-encryption-cracked-in-less-than-two-hours/] 2 [3G encryption can be broken in 2 hours, 'suggest' security experts, http://www.fiercewireless.com/europe/story/3g-encryption-can-be-broken-2-hours-suggest-security-experts/2010-01-15]

Page 13: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Blackberry

• Uses BlackBerry1 OS.• Every Phone has a BlackBerry PIN (8 hexadecimal Number).• BlackBerry uses Standard, Triple DES and AES encryption schemes2.• Issues in some countries:

– India: In January 2011, RIM gave India access to its consumer services, including its Messenger services, but said it could not allow monitoring of its enterprise email.

– Saudi Arabia: Saudi Arabia has threatened to ban the service, but reportedly it was close to reaching an agreement with RIM to set up a server for the service inside the Kingdom.

– UAE: In October 2010, UAE tried to ban the service requesting to bring servers inside the country, however their request was denied. Later, blackberry services were back.

1 [http://en.wikipedia.org/wiki/BlackBerry] 2 [http://docs.blackberry.com/en/admin/deliverables/12873/Standard_BlackBerry_message_encryption_193608_11.jsp]

Page 14: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Privacy: Geotagging

• Adding geographical identification to photographs, video, websites and SMS messages.

• It is the equivalent of adding a 10-digit grid coordinate to everything you post on the internet1.

• In some smartphones this information is embedded with every picture taken by that device.

• Many social applications allow users to share their location (Facebook, Twitter, Flicker, etc.).

1 [http://www.slideshare.net/NavalOPSEC/geotagging-safety]

Page 15: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Is Geotagging potentially dangerous?

• It can establish personal patterns. It could potentially be easy to identify a user’s daily routine and times.

• Exposing home and work addresses.

Page 16: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS – Geotagging: Example1

• Adam Savage, of “Myth Busters”, took a photo using his phone and posted it on his Twitter account with “off to work” as the message.

• His photo contained metadata revealing the exact geographical location of his house.

1 [Web Photos That Reveal Secrets, Like Where You Live , August 11, 2010, The NY Times, http://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html?pagewanted=all]

Page 17: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

ACCESS - Privacy: Custom Profiling

• Malls used phones signals to track shoppers on black Friday1.

• Could lead to spam advertisement.

1 [http://money.cnn.com/2011/11/22/technology/malls_track_cell_phones_black_friday/index.htm]

Page 18: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

Recommendations on how to better protect your data

• Use password and auto-lock feature.• Do not auto save passwords in applications.• Do not let your mobile device out of your sight. • Make sure that your phone OS and apps are updated.• Try not to use un-secure wireless hotspots.• Encryption on local drive and external flash drives:

– Windows mobile: SecuBox, 3rd party application1.– Android: Droid Crypt, AnDisk Encryption, 3rd party uses AES 128-bit2. – iPhone: no apps available yet, some apps for encrypting voice calls and

messages.– Blackberry: offers “content protection” that encrypts all data in the device4.

• Subscribe with remote wipe (if available).• Possible newer security methods like Picture Password3.1 [http://www.aikosolutions.com] 2 [http://www.pcworld.com/article/242650/how_to_encrypt_your_smartphone.html] 3 [http://blogs.msdn.com/b/b8/archive/2011/12/16/signing-in-with-a-picture-password.aspx]4 [http://docs.blackberry.com/en/smartphone_users/deliverables/1487/About_content_protection_29009_11.jsp]

Page 19: Security and Trust in Mobile Devices Abdulrhman Alkhanifer Ricardo Figueroa

Questions?